• /
  • EnglishEspaΓ±olFranΓ§aisζ—₯本θͺžν•œκ΅­μ–΄PortuguΓͺs
  • λ‘œκ·ΈμΈμ§€κΈˆ μ‹œμž‘ν•˜κΈ°

ECS 톡합 μ„€μΉ˜

λ‰΄λ λ¦­μ˜ ECS 톡합은 Amazon ECS ν™˜κ²½μ˜ μ„±λŠ₯ 데이터λ₯Ό λ³΄κ³ ν•˜κ³  ν‘œμ‹œν•©λ‹ˆλ‹€.

μ„€μΉ˜ κ°œμš”

μ„€μΉ˜ν•˜κΈ° 전에 인프라 μ—μ΄μ „νŠΈ(newrelic-infra)κ°€ λ‹€μŒ 두 κ°€μ§€ μ‹œμž‘ μœ ν˜•μ— λŒ€ν•΄ λ°°ν¬λ˜λŠ” 방식을 κ°œκ΄„μ μœΌλ‘œ μ΄ν•΄ν•˜λŠ” 데 도움이 될 수 μžˆμŠ΅λ‹ˆλ‹€.

μ„€μΉ˜ μ˜΅μ…˜

μ›ν•˜λŠ” μ„€μΉ˜ 방법 선택:

CloudFormation을 μ‚¬μš© μ„€μΉ˜

AWS CloudFormation을 μ‚¬μš©ν•΄ μ„€μΉ˜ν•  수 μžˆλ„λ‘ EC2, EXTERNAL(ECS Anywhere) 및 AWS Fargate μ‹œμž‘ μœ ν˜•μ˜ AWS 계정에 ECS 톡합을 μ„€μΉ˜ν•˜λŠ” λͺ‡ κ°€μ§€ CloudFormation ν…œν”Œλ¦Ώμ„ μ œκ³΅ν•©λ‹ˆλ‹€.

CloudFormation을 μ‚¬μš©ν•˜μ—¬ μ„€μΉ˜ν•˜λ €λ©΄:

  1. ECS 톡합 μž‘μ—…μ„ λ“±λ‘ν•˜λ €λ©΄ 이 μŠ€νƒμ„ λ°°ν¬ν•©λ‹ˆλ‹€. μ›ν•˜λŠ” 지역에 μŠ€νƒμ΄ λ°°ν¬λ˜λŠ”μ§€ ν™•μΈν•©λ‹ˆλ‹€. 이 μŠ€νƒμ€ λ‹€μŒ λ¦¬μ†ŒμŠ€λ₯Ό μƒμ„±ν•©λ‹ˆλ‹€.

    • 뉴렐릭

      을 μ €μž₯ν•˜λŠ” μ‹œν¬λ¦Ώ

    • λΌμ΄μ„ μŠ€ 킀에 μ•‘μ„ΈμŠ€ν•˜κΈ° μœ„ν•œ μ •μ±…μž…λ‹ˆλ‹€.

    • λΌμ΄μ„ μŠ€ 킀에 λŒ€ν•œ μ•‘μ„ΈμŠ€ κΆŒν•œμ΄ μžˆλŠ” ECS μž‘μ—… ExecutionRole둜 μ‚¬μš©ν•  μΈμŠ€ν„΄μŠ€ μ—­ν• μž…λ‹ˆλ‹€.

    • EC2 및 μ™ΈλΆ€(ECS Anywhere) μ‹œμž‘ μœ ν˜•μ˜ 경우: 뉴렐릭 Infrastructure ECS 톡합 μž‘μ—…μ„ λ“±λ‘ν•©λ‹ˆλ‹€.

  2. μ‹œμž‘ μœ ν˜•μ— λŒ€ν•œ μΆ”κ°€ 지침을 λ”°λ¦…λ‹ˆλ‹€.

μ™„λ£Œλ˜λ©΄ λ‹€μŒ 단계λ₯Ό μ°Έμ‘°ν•˜μ‹­μ‹œμ˜€.

μžλ™ 슀크립트둜 μ„€μΉ˜

ν•œ κ°€μ§€ μ„€μΉ˜ μ˜΅μ…˜μ€ μ„€μΉ˜ 슀크립트λ₯Ό μ‚¬μš©ν•˜λŠ” κ²ƒμž…λ‹ˆλ‹€. μžλ™ μ„€μΉ˜ 슀크립트λ₯Ό μ‚¬μš©ν•˜λ €λ©΄:

  1. ECS 톡합 μ„€μΉ˜ ν”„λ‘œκ·Έλž¨μ„ λ‹€μš΄λ‘œλ“œν•©λ‹ˆλ‹€.

    bash
    $
    curl -O https://download.newrelic.com/infrastructure_agent/integrations/ecs/newrelic-infra-ecs-installer.sh
  2. μ„€μΉ˜ ν”„λ‘œκ·Έλž¨μ— μ‹€ν–‰ κΆŒν•œμ„ μΆ”κ°€ν•©λ‹ˆλ‹€.

    bash
    $
    chmod +x newrelic-infra-ecs-installer.sh
  3. λ¬Έμ„œ 및 μš”κ΅¬ 사항을 보렀면 -h둜 μ‹€ν–‰ν•©λ‹ˆλ‹€.

    bash
    $
    ./newrelic-infra-ecs-installer.sh -h
  4. AWS ν”„λ‘œνŒŒμΌμ΄ ECS ν΄λŸ¬μŠ€ν„°κ°€ μƒμ„±λœ λ™μΌν•œ 리전을 κ°€λ¦¬ν‚€λŠ”μ§€ ν™•μΈν•©λ‹ˆλ‹€.

    bash
    $
    aws configure get region
    us-east-1
    $
    aws ecs list-clusters
    YOUR_CLUSTER_ARNS
    arn:aws:ecs:us-east-1:YOUR_AWS_ACCOUNT:cluster/YOUR_CLUSTER
  5. 및 ν΄λŸ¬μŠ€ν„° 이름을 μ§€μ •ν•˜μ—¬ μ„€μΉ˜ ν”„λ‘œκ·Έλž¨μ„ μ‹€ν–‰ν•©λ‹ˆλ‹€.

  6. Fargate μ‹œμž‘ μœ ν˜•μ— λŒ€ν•œ μΆ”κ°€ 단계(EC2 μ‹œμž‘ μœ ν˜• μ•„λ‹˜):

    • 배포할 μ‚¬μ΄λ“œμΉ΄ μ»¨ν…Œμ΄λ„ˆκ°€ μžˆλŠ” μž‘μ—… μ •μ˜ μ˜ˆμ‹œλ₯Ό λ‹€μš΄λ‘œλ“œν•©λ‹ˆλ‹€.

      bash
      $
      curl -O https://download.newrelic.com/infrastructure_agent/integrations/ecs/newrelic-infra-ecs-fargate-example-latest.json

      팁

      Graviton의 경우, "cpuArchitecture": "X86_64"λ₯Ό "cpuArchitecture": "ARM64"둜 λ°”κΏ‰λ‹ˆλ‹€.

      방금 μƒμ„±λœ NewRelicECSTaskExecutionRole을 μž‘μ—… μ‹€ν–‰ μ—­ν• λ‘œ μ‚¬μš©ν•΄μ•Ό ν•˜λŠ” 것에 μ£Όμ˜ν•˜μ‹­μ‹œμ˜€. 역할에 μ—°κ²°λœ μ •μ±…(λͺ¨λ“  μ‹œμž‘ μœ ν˜•):

      • NewRelicSSMLicenseKeyReadAccess λΌμ΄μ„ μŠ€ ν‚€λ₯Ό μ‚¬μš©ν•΄ SSM에 λŒ€ν•œ μ•‘μ„ΈμŠ€λ₯Ό ν™œμ„±ν™”ν•  수 μžˆλ„λ‘ ν•©λ‹ˆλ‹€.
      • AmazonECSTaskExecutionRolePolicy
    • 그런 λ‹€μŒ, λͺ¨λ‹ˆν„°λ§ν•˜λ €λŠ” μ»¨ν…Œμ΄λ„ˆλ₯Ό μ‚¬μ΄λ“œμΉ΄λ‘œ μΆ”κ°€ν•  수 μžˆμŠ΅λ‹ˆλ‹€.

μ™„λ£Œλ˜λ©΄ λ‹€μŒ 단계λ₯Ό μ°Έμ‘°ν•˜μ‹­μ‹œμ˜€.

μˆ˜λ™ μ„€μΉ˜

ν•œ κ°€μ§€ μ„€μΉ˜ μ˜΅μ…˜μ€ μžλ™ μ„€μΉ˜ ν”„λ‘œκ·Έλž¨ μŠ€ν¬λ¦½νŠΈμ—μ„œ μˆ˜ν–‰ν•˜λŠ” 단계λ₯Ό μˆ˜λ™μœΌλ‘œ μˆ˜ν–‰ν•˜λŠ” κ²ƒμž…λ‹ˆλ‹€. awscli νˆ΄μ„ μ‚¬μš©ν•˜μ—¬ 이 μž‘μ—…μ„ μˆ˜ν–‰ν•˜λŠ” 방법을 μ„€λͺ…ν•©λ‹ˆλ‹€.

  1. AWS ν”„λ‘œνŒŒμΌμ΄ ECS ν΄λŸ¬μŠ€ν„°κ°€ μƒμ„±λœ λ™μΌν•œ 리전을 κ°€λ¦¬ν‚€λŠ”μ§€ ν™•μΈν•©λ‹ˆλ‹€.

    bash
    $
    aws configure get region
    us-east-1
    $
    aws ecs list-clusters
    YOUR_CLUSTER_ARNS
    arn:aws:ecs:us-east-1:YOUR_AWS_ACCOUNT:cluster/YOUR_CLUSTER
  2. λ₯Ό Systems Manager(SSM) λ§€κ°œλ³€μˆ˜λ‘œ μ €μž₯ν•©λ‹ˆλ‹€.

    bash
    $
    aws ssm put-parameter \
    >
    --name "/newrelic-infra/ecs/license-key" \
    >
    --type SecureString \
    >
    --description 'New Relic license key for ECS monitoring' \
    >
    --value "NEW_RELIC_LICENSE_KEY"
  3. λΌμ΄μ„ μŠ€ ν‚€ νŒŒλΌλ―Έν„°μ— μ•‘μ„ΈμŠ€ν•˜κΈ° μœ„ν•œ IAM 정책을 μƒμ„±ν•©λ‹ˆλ‹€.

    bash
    $
    aws iam create-policy \
    >
    --policy-name "NewRelicSSMLicenseKeyReadAccess" \
    >
    --policy-document "{\"Version\":\"2012-10-17\",\"Statement\":[{\"Effect\":\"Allow\",\"Action\":[\"ssm:GetParameters\"],\"Resource\":[\"ARN_OF_LICENSE_KEY_PARAMETER\"]}]}" \
    >
    --description "Provides read access to the New Relic SSM license key parameter"
  4. μž‘μ—… μ‹€ν–‰ μ—­ν• λ‘œ μ‚¬μš©ν•  IAM 역할을 μƒμ„±ν•©λ‹ˆλ‹€.

    bash
    $
    aws iam create-role \
    >
    --role-name "NewRelicECSTaskExecutionRole" \
    >
    --assume-role-policy-document '{"Version":"2008-10-17","Statement":[{"Sid":"","Effect":"Allow","Principal":{"Service":"ecs-tasks.amazonaws.com"},"Action":"sts:AssumeRole"}]}' \
    >
    --description "ECS task execution role for New Relic infrastructure"
  5. μ •μ±… NewRelicSSMLicenseKeyReadAccess 및 AmazonECSTaskExecutionRolePolicyλ₯Ό 역할에 μ—°κ²°ν•©λ‹ˆλ‹€.

    bash
    $
    aws iam attach-role-policy \
    >
    --role-name "NewRelicECSTaskExecutionRole" \
    >
    --policy-arn "POLICY_ARN"
  6. μžμ„Έν•œ 지침을 보렀면 μ‹œμž‘ μœ ν˜•μ„ μ„ νƒν•©λ‹ˆλ‹€.

μ™„λ£Œλ˜λ©΄ λ‹€μŒ 단계λ₯Ό μ°Έμ‘°ν•˜μ‹­μ‹œμ˜€.

이 λ¬Έμ„œκ°€ μ„€μΉ˜ν•˜λŠ”λ° 도움이 λ˜μ…¨λ‚˜μš”?

μ„€μΉ˜ ν›„ λ‹€μŒ 단계

이 톡합을 μ„€μΉ˜ν•œ ν›„:

μƒμ„±λœ AWS λ¦¬μ†ŒμŠ€

κΈ°λ³Έ/ꢌμž₯ 값을 μ‚¬μš©ν•˜μ—¬ ECS 톡합을 μ„€μΉ˜ν•˜λ©΄ AWSμ—μ„œ λ‹€μŒμ„ μˆ˜ν–‰ν•©λ‹ˆλ‹€.

  • Systems Manager(SSM) λ§€κ°œλ³€μˆ˜ /newrelic-infra/ecs/license-keyλ₯Ό μƒμ„±ν•©λ‹ˆλ‹€. 이 μ‹œμŠ€ν…œμ—λŠ” 뉴렐릭

    κ°€ ν¬ν•¨λ˜μ–΄ μžˆμŠ΅λ‹ˆλ‹€.

  • λΌμ΄μ„ μŠ€ ν‚€λ‘œ SSM λ§€κ°œλ³€μˆ˜μ— λŒ€ν•œ μ•‘μ„ΈμŠ€λ₯Ό ν™œμ„±ν™”ν•˜λŠ” IAM μ •μ±… NewRelicSSMLicenseKeyReadAccessλ₯Ό μƒμ„±ν•©λ‹ˆλ‹€.

  • μž‘μ—… μ‹€ν–‰ μ—­ν• λ‘œ μ‚¬μš©λ˜λŠ” IAM μ—­ν•  NewRelicECSTaskExecutionRole을 μƒμ„±ν•©λ‹ˆλ‹€. 역할에 μ—°κ²°λœ μ •μ±…:

    • NewRelicSSMLicenseKeyReadAccess (μ„€μΉ˜ ν”„λ‘œκ·Έλž¨μœΌλ‘œ 생성)
    • AmazonECSTaskExecutionRolePolicy
  • EC2 및 μ™ΈλΆ€(ECS Anywhere) μ‹œμž‘ μœ ν˜•μ— λŒ€ν•œ newrelic-infra ECS μž‘μ—… μ •μ˜λ₯Ό λ“±λ‘ν•©λ‹ˆλ‹€.

  • EC2 μ‹œμž‘ μœ ν˜•μ˜ 경우 λ‹€μŒλ„ μˆ˜ν–‰λ©λ‹ˆλ‹€.

    • 데λͺ¬ μŠ€μΌ€μ€„λ§ μ „λž΅ 및 EC2 μ‹œμž‘ μœ ν˜•μ„ μ‚¬μš©ν•˜μ—¬ λ“±λ‘λœ μž‘μ—…μ— λŒ€ν•œ μ„œλΉ„μŠ€ newrelic-infraλ₯Ό μƒμ„±ν•©λ‹ˆλ‹€.
  • EXTERNAL(ECS Anywhere) μ‹œμž‘ μœ ν˜•μ˜ 경우, 이 μž‘μ—…λ„ μˆ˜ν–‰λ©λ‹ˆλ‹€.

    • 데λͺ¬ μŠ€μΌ€μ€„λ§ μ „λž΅ 및 EXTERNAL(ECS Anywhere) μ‹œμž‘ μœ ν˜•μ„ μ‚¬μš©ν•˜μ—¬ λ“±λ‘λœ μž‘μ—…μ— λŒ€ν•œ μ„œλΉ„μŠ€ newrelic-infra-external을 μƒμ„±ν•©λ‹ˆλ‹€.
Copyright Β© 2025 New Relic Inc.

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.